Oops: general protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] SMP KASAN NOPTI
KASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007]
CPU: 1 UID: 0 PID: 280 Comm: syz-executor.0 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary)
Tainted: [W]=WARN
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
kmemleak: Found object by alias at 0x607f1a639884
CPU: 0 UID: 0 PID: 3967 Comm: syz-executor.4 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary)
Tainted: [W]=WARN
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
Call Trace:
dump_stack_lvl+0xca/0x120
__lookup_object+0x94/0xb0
delete_object_full+0x27/0x70
free_percpu+0x30/0x1160
futex_hash_free+0x38/0xc0
mmput+0x2d3/0x390
do_exit+0x79d/0x2970
do_group_exit+0xd3/0x2a0
get_signal+0x2315/0x2340
arch_do_signal_or_restart+0x80/0x790
exit_to_user_mode_loop+0x8b/0x110
do_syscall_64+0x2f7/0x360
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f091ae99b19
Code: Unable to access opcode bytes at 0x7f091ae99aef.
RSP: 002b:00007f091840f218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca
RAX: 0000000000000001 RBX: 00007f091afacf68 RCX: 00007f091ae99b19
RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007f091afacf6c
RBP: 00007f091afacf60 R08: 0000000000000016 R09: 0000000000000000
R10: ffffffffffffffff R11: 0000000000000246 R12: 00007f091afacf6c
R13: 00007fff6b34467f R14: 00007f091840f300 R15: 0000000000022000
kmemleak: Object (percpu) 0x607f1a639880 (size 8):
kmemleak: comm "syz-executor.3", pid 3962, jiffies 4294790846
kmemleak: min_count = 1
kmemleak: count = 0
kmemleak: flags = 0x21
kmemleak: checksum = 0
kmemleak: backtrace:
pcpu_alloc_noprof+0x87a/0x1170
fib_nh_common_init+0x30/0xd0
fib6_nh_init+0x968/0x1a00
ip6_route_info_create_nh+0x530/0xf80
addrconf_f6i_alloc+0x208/0x430
__ipv6_dev_ac_inc+0x2fc/0xd80
ipv6_sock_ac_join+0x8aa/0x1100
do_ipv6_setsockopt+0x3f54/0x47b0
ipv6_setsockopt+0xcb/0x170
udpv6_setsockopt+0x84/0xd0
do_sock_setsockopt+0xf7/0x1e0
__sys_setsockopt+0x11f/0x1a0
__x64_sys_setsockopt+0xbe/0x160
do_syscall_64+0xbf/0x360
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0010:dst_dev_put+0x21/0x250
Code: 90 90 90 90 90 90 90 90 90 f3 0f 1e fa 41 54 55 53 48 89 fb e8 40 c6 a8 fd 48 89 da 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 <80> 3c 02 00 0f 85 b5 01 00 00 48 8d 7b 3a 48 8b 2b 48 b8 00 00 00
RSP: 0018:ffff88806cf08da0 EFLAGS: 00010256
RAX: dffffc0000000000 RBX: 0000000000000001 RCX: ffffffff84103a71
RDX: 0000000000000000 RSI: ffffffff83cb2140 RDI: 0000000000000001
RBP: dffffc0000000000 R08: 0000000000000001 R09: 0000000000000001
R10: 0000000000000001 R11: 0000000000000001 R12: fffffbfff0b0a4ac
R13: 0000607f1a639880 R14: 0000607f1a639880 R15: 0000000000000001
FS: 000055558dcb6400(0000) GS:ffff8880e56dd000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000001b2d226000 CR3: 0000000039181000 CR4: 0000000000350ef0
Call Trace:
rt_fibinfo_free_cpus.part.0+0xdb/0x1a0
fib_nh_common_release+0xa8/0x2c0
fib6_info_destroy_rcu+0x18b/0x1f0
rcu_core+0x7c8/0x1800
handle_softirqs+0x1b1/0x770
__irq_exit_rcu+0xc4/0x100
irq_exit_rcu+0x9/0x20
sysvec_apic_timer_interrupt+0x70/0x80
asm_sysvec_apic_timer_interrupt+0x1a/0x20
RIP: 0010:__sanitizer_cov_trace_pc+0x8/0x80
Code: 4a 03 48 c7 c0 f4 ff ff ff eb 92 0f 1f 80 00 00 00 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa 48 8b 34 24 <65> 48 8b 15 88 48 10 06 65 8b 05 99 48 10 06 a9 00 01 ff 00 74 27
RSP: 0018:ffff888013e376b8 EFLAGS: 00000202
RAX: 0000000000000003 RBX: 0000000000000000 RCX: ffffffff819e524b
RDX: 0000000000000000 RSI: ffffffff819e4738 RDI: 0000000000000001
RBP: ffff888013e37938 R08: 0000000000000000 R09: fffff9400018fee0
R10: 0000000000000000 R11: 0000000000000001 R12: 0000000000000000
R13: ffffea0000c7f700 R14: ffffea0000c7f700 R15: dffffc0000000000
copy_page_range+0x1418/0x5140
dup_mmap+0xd2f/0x1d10
copy_process+0x3ad5/0x73c0
kernel_clone+0xea/0x7f0
__do_sys_clone+0xce/0x120
do_syscall_64+0xbf/0x360
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f47be28310b
Code: ed 0f 85 60 01 00 00 64 4c 8b 0c 25 10 00 00 00 45 31 c0 4d 8d 91 d0 02 00 00 31 d2 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 89 00 00 00 41 89 c5 85 c0 0f 85 90 00 00
RSP: 002b:00007ffc90bcdd40 EFLAGS: 00000246 ORIG_RAX: 0000000000000038
RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f47be28310b
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011
RBP: 0000000000000001 R08: 0000000000000000 R09: 000055558dcb6400
R10: 000055558dcb66d0 R11: 0000000000000246 R12: 0000000000000001
R13: 0000000000000000 R14: 0000000000000001 R15: 00007ffc90bcde20
Modules linked in:
---[ end trace 0000000000000000 ]---
RIP: 0010:dst_dev_put+0x21/0x250
Code: 90 90 90 90 90 90 90 90 90 f3 0f 1e fa 41 54 55 53 48 89 fb e8 40 c6 a8 fd 48 89 da 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 <80> 3c 02 00 0f 85 b5 01 00 00 48 8d 7b 3a 48 8b 2b 48 b8 00 00 00
RSP: 0018:ffff88806cf08da0 EFLAGS: 00010256
RAX: dffffc0000000000 RBX: 0000000000000001 RCX: ffffffff84103a71
RDX: 0000000000000000 RSI: ffffffff83cb2140 RDI: 0000000000000001
RBP: dffffc0000000000 R08: 0000000000000001 R09: 0000000000000001
R10: 0000000000000001 R11: 0000000000000001 R12: fffffbfff0b0a4ac
R13: 0000607f1a639880 R14: 0000607f1a639880 R15: 0000000000000001
FS: 000055558dcb6400(0000) GS:ffff8880e56dd000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000001b2d226000 CR3: 0000000039181000 CR4: 0000000000350ef0
----------------
Code disassembly (best guess):
0: 90 nop
1: 90 nop
2: 90 nop
3: 90 nop
4: 90 nop
5: 90 nop
6: 90 nop
7: 90 nop
8: 90 nop
9: f3 0f 1e fa endbr64
d: 41 54 push %r12
f: 55 push %rbp
10: 53 push %rbx
11: 48 89 fb mov %rdi,%rbx
14: e8 40 c6 a8 fd callq 0xfda8c659
19: 48 89 da mov %rbx,%rdx
1c: 48 b8 00 00 00 00 00 movabs $0xdffffc0000000000,%rax
23: fc ff df
26: 48 c1 ea 03 shr $0x3,%rdx
* 2a: 80 3c 02 00 cmpb $0x0,(%rdx,%rax,1) <-- trapping instruction
2e: 0f 85 b5 01 00 00 jne 0x1e9
34: 48 8d 7b 3a lea 0x3a(%rbx),%rdi
38: 48 8b 2b mov (%rbx),%rbp
3b: 48 rex.W
3c: b8 .byte 0xb8
3d: 00 00 add %al,(%rax)